Abstract
With the emergence of service-oriented economy, distributed systems and cloud computing, thus the development of service oriented architecture and the adoption open standards become a mean to assure interoperability. Privacy could play a key role for digital identity protection and security. We suggest an implementation framework, Privacy-as-a-Set-of-Services (PaaSS) framework, which could help information system’s security team to implement digital identity privacy requirements into a set of services. The framework relays on the idea that digital identity privacy business interoperability should be taken into consideration from the outset of the project in order to be able to provide technical interoperability. Business interoperability is a set of requirements that are drawn from global, domestic and business-specific privacy policies, however, technical interoperability is offered through the adoption of open standards and implementation of a set of services and service’s interfaces that could accommodate SOA. The framework is in accordance of model-driven architecture (MDA) approach and it is composed of five layers and three mapping gateways. Inter- & intra-layers iterations are consequence of SOA delivery lifecycle and strategies alignment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Philippsohn, S.: ID and the Law. In: Birch, D.G.W. (ed.) Digital Identity Management: Perspectives on the Technological, Business and Social Implications, pp. 193–203. Gower Publishing Limited (2007)
Cochrane, P.: Forward of the Book. In: Birch, D.G.W. (ed.) Digital Identity Management: Perspectives on the Technological, Business and Social Implications. Gower Publishing Limited (2007)
Cameron, K.: The Laws of Identity. ed: Microsoft Corporation (2005)
Hansen, M., et al.: Privacy and Identity Management. IEEE Security & Privacy (2008)
Bell, G., Gemmel, J.: A Digital Life. Scientific American Magazine, 58–65 (2007)
International Telecommunication Union. Digital Life. ITU Internet Report (2006), http://www.itu.int/osg/spu/publications/digitalife/docs/digital-life-web.pdf
Windley, P.J.: Digital Identity: Unmasking identity management architecture (IMA). O’Reilly Media (2005)
Cukier, K.: A special report on managing information. The Economist, February 23-March 5 (2010)
Organizing Committee of Digital Identity & Privacy (Human Capital & Social Innovation Technology Summit). Call for Controbution to Managing Digital Identities for Education, Employment and Business Development (2007), http://events.eife-l.org/HCSIT2007/overview/dip/dip2007
Erl, T.: Service-Oriented Architecture: Concepts, Technology, and Design. Prentice Hall (2005)
Noonan, H.: Identity, in Stanford Encyclopedia of Philosophy, ed. (2009)
Organisation for Economic Co-operation and Development. The Role of Digital Identity Management in the Internet Economy: A primer for policy makers (2009), http://www.oecd.org/dataoecd/55/48/43091476.pdf
Benantar, M.: Access Control Systems: Security, Identity Management and Trust Models. Springer Science + Business Media (2006)
Ben Ayed, G., Ghernaouti-Hélie, S.: Privacy Requirements Specification for Digital Identity Management Systems Implementation: Towards a digital society of privacy. In: 6th International Conference for Internet Technology and Secured Transactions (ICITST 2011), Abu Dhabi, UAE (2011)
Center for Democracy & Technology. Privacy Principles for Identity in the Digital Age (Draft for Comment - Version 1.4) (2007), http://www.cdt.org/files/pdfs/20071201_IDPrivacyPrinciples.pdf
Organization for Economic Co-operation and Development (OECD). At Crossroads: Personhood and Digital Identity in the Information Society. The Working Paper series of the OECD Directorate for Science, Technology and Industry (2008), http://www.oecd.org/LongAbstract/0,3425,en_2649_34223_40204774_119684_1_1_1,00.html
Lessig, L.: Code and Other Laws of Cyberspace. Basic Books (2000)
Cavoukian, A.: Privacy by Design (2009), http://www.privacybydesign.ca/pbdbook/PrivacybyDesignBook.pdf
Sandhu, R.: Engineering Authority and Trust in Cyberspace: The OM-AM and RABC Way. In: Proceedings of the 5th ACM Workshop on RBAC, pp. 111–119 (2000)
Schubert, L., et al.: The Future of Cloud Computing: Opportunities for European cloud computing beyond 2010 (2009), http://cordis.europa.eu/fp7/ict/ssai/docs/cloud-report-final.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ayed, G.B., Ghernaouti-Hélie, S. (2012). Architecting Interoperable Privacy within User-Centric Federated Digital Identity Systems: Overview of a Service-Oriented Implementation Framework. In: Benlamri, R. (eds) Networked Digital Technologies. NDT 2012. Communications in Computer and Information Science, vol 294. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30567-2_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-30567-2_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30566-5
Online ISBN: 978-3-642-30567-2
eBook Packages: Computer ScienceComputer Science (R0)